× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3b4122a2978814573344e1def806bdc1a47032a4fe7b19341148b39b2b8eec6b
File name: 07d73e899e80ce900df49ab573fb6aae.virus
Detection ratio: 44 / 68
Analysis date: 2018-06-19 01:43:45 UTC ( 8 months, 1 week ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.30977631 20180618
AhnLab-V3 Malware/Win32.Hpgen.C2571570 20180618
ALYac Trojan.GenericKD.30977631 20180618
Antiy-AVL Trojan[Ransom]/Win32.GandCrypt 20180619
Avast Win32:Malware-gen 20180618
AVG Win32:Malware-gen 20180619
AVware Trojan.Win32.Generic!BT 20180618
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9994 20180615
BitDefender Trojan.GenericKD.30977631 20180618
Bkav W32.eHeur.Malware08 20180618
CrowdStrike Falcon (ML) malicious_confidence_80% (D) 20180530
Cybereason malicious.2708d3 20180225
Cylance Unsafe 20180619
Cyren W32/Trojan.KCOS-5354 20180619
DrWeb Trojan.Encoder.24384 20180618
Emsisoft Trojan.GenericKD.30977631 (B) 20180618
Endgame malicious (high confidence) 20180612
ESET-NOD32 Win32/TrojanDownloader.Zurgop.DA 20180619
F-Prot W32/S-e009bc5e!Eldorado 20180618
F-Secure Trojan.GenericKD.30977631 20180619
Fortinet W32/GandCrab.SMG!tr 20180618
GData Trojan.GenericKD.30977631 20180618
Ikarus Trojan.Win32.Krypt 20180618
Sophos ML heuristic 20180601
K7AntiVirus Trojan ( 0053305e1 ) 20180618
K7GW Trojan ( 0053305e1 ) 20180619
Kaspersky Backdoor.Win32.Mokes.xlm 20180618
Malwarebytes Trojan.MalPack 20180618
MAX malware (ai score=82) 20180619
McAfee Trojan-FPST!07D73E899E80 20180618
McAfee-GW-Edition BehavesLike.Win32.Generic.dc 20180618
Microsoft Trojan:Win32/Dynamer!rfn 20180619
eScan Trojan.GenericKD.30977631 20180618
NANO-Antivirus Trojan.Win32.Encoder.fedotq 20180618
Panda Trj/Genetic.gen 20180618
Qihoo-360 HEUR/QVM10.2.EE21.Malware.Gen 20180619
SentinelOne (Static ML) static engine - malicious 20180618
Sophos AV Mal/Generic-S 20180618
Symantec Ransom.GandCrab 20180618
Tencent Win32.Backdoor.Mokes.Hpf 20180619
TrendMicro Mal_HPGen-37b 20180618
TrendMicro-HouseCall Mal_HPGen-37b 20180618
Webroot W32.Adware.Installcore 20180619
ZoneAlarm by Check Point Backdoor.Win32.Mokes.xlm 20180618
AegisLab 20180619
Alibaba 20180615
Arcabit 20180619
Avast-Mobile 20180619
Avira (no cloud) 20180619
Babable 20180406
CAT-QuickHeal 20180618
ClamAV 20180619
CMC 20180618
Comodo 20180619
eGambit 20180619
Jiangmin 20180618
Kingsoft 20180619
Palo Alto Networks (Known Signatures) 20180619
Rising 20180618
SUPERAntiSpyware 20180618
Symantec Mobile Insight 20180614
TACHYON 20180618
TheHacker 20180613
TotalDefense 20180618
Trustlook 20180619
VBA32 20180618
VIPRE 20180619
ViRobot 20180618
Yandex 20180618
Zillya 20180618
Zoner 20180619
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-06-15 06:29:16
Entry Point 0x00005086
Number of sections 5
PE sections
PE imports
EndPath
GetSystemTime
GetLastError
InitializeCriticalSection
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LCMapStringW
SetHandleCount
LoadLibraryW
GetOEMCP
GetEnvironmentStringsW
IsDebuggerPresent
GetTickCount
TlsAlloc
VirtualProtect
GetModuleFileNameA
RtlUnwind
GetStdHandle
DeleteCriticalSection
GetCurrentProcess
EnumSystemLocalesA
GetStartupInfoW
GetCurrentDirectoryW
GetLocaleInfoA
GetCurrentProcessId
GetModuleHandleW
GetCPInfo
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
HeapSize
GetFileInformationByHandle
InitializeCriticalSectionAndSpinCount
GetCommandLineA
GetProcAddress
InterlockedCompareExchange
GetLocaleInfoW
ExitProcess
RaiseException
WideCharToMultiByte
GetModuleFileNameW
TlsFree
FreeEnvironmentStringsW
HeapSetInformation
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
DecodePointer
GetSystemTimeAsFileTime
IsValidLocale
GetACP
HeapReAlloc
GetStringTypeW
GetUserDefaultLCID
HeapAlloc
GetSystemTimeAdjustment
GetFileType
FindAtomW
QueryPerformanceCounter
GetProcessShutdownParameters
IsValidCodePage
HeapCreate
GlobalAlloc
InterlockedDecrement
Sleep
TerminateProcess
TlsSetValue
EncodePointer
GetCurrentThreadId
LeaveCriticalSection
SetLastError
InterlockedIncrement
DragQueryFileA
ShellExecuteW
ExtractIconW
DragFinish
ShellAboutW
LoadIconA
GetMenuInfo
EndPaint
GetAltTabInfoA
GetUpdateRect
GetNextDlgTabItem
Number of PE resources by type
RT_ICON 3
RT_BITMAP 2
JUDEWOCE 1
RT_DIALOG 1
RT_GROUP_CURSOR 1
MENUPONAGAROZUKAFOTOVIBI 1
KKNAX 1
GIKI 1
VUJOKAGOMI 1
RT_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 10
ENGLISH UK 3
ENGLISH US 1
ITALIAN 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

FileFlagsMask
0x003f

MachineType
Intel 386 or later, and compatibles

TimeStamp
2018:06:15 07:29:16+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
81920

LinkerVersion
10.0

FileSubtype
0

ProductVersionNumber
12.0.0.0

UninitializedDataSize
0

FileTypeExtension
exe

InitializedDataSize
141312

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

FileVersionNumber
11.0.0.0

EntryPoint
0x5086

FileOS
Unknown (0x588891)

ObjectFileType
VxD

File identification
MD5 07d73e899e80ce900df49ab573fb6aae
SHA1 232bc522708d3361c6713043d297bc5440759509
SHA256 3b4122a2978814573344e1def806bdc1a47032a4fe7b19341148b39b2b8eec6b
ssdeep
3072:lBjTJkyghW+5sCp324QOXM4uE+BNvYT3keXyLSev26oVHqt00RXjXEZgeQ:lBjuyghEuTQOXdnS9YjXCpTXE6eQ

authentihash 022e2591c13b0de67793d08d060a80df03fb2b0b4c411bc79182f80c8355d5c8
imphash 86ff9f2ae91ae6c30a4bfc302c1e889f
File size 210.5 KB ( 215552 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-06-19 01:43:45 UTC ( 8 months, 1 week ago )
Last submission 2018-06-19 01:43:45 UTC ( 8 months, 1 week ago )
File names 07d73e899e80ce900df49ab573fb6aae.virus
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs